Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Why is it Safer to Use a Prebuilt Platform for your Website?
    • Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity
    • 10 Strategies to Stop Ransomware Attacks
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 27, 2022

      Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 26, 2022

      10 Strategies to Stop Ransomware Attacks

      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 27, 2022

      Why is it Safer to Use a Prebuilt Platform for your Website?

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

    TechSpective
    You are at:Home»Business»Compliance»One Year After GDPR: Is Our Personal Data Safer?
    GDPR data breach data protection privacy
    Image from Pixabay

    One Year After GDPR: Is Our Personal Data Safer?

    4
    By Erika Lee on June 19, 2019 Compliance, Data Protection, GDPR, Privacy

    Since GDPR’s implementation a year ago, a lot has changed in the world of data privacy – with some changes that were expected, some not.

    GDPR has reinvigorated companies’ efforts to ensure personal information is protected and handled properly. It drove corporate transparency around how personal data is being used. The regulation empowered consumers to demand more in the way of privacy protection. Finally, GDPR has catalyzed international dialog around the need for a global standard. However, despite all the efforts companies have made to better secure personal data in response to GDPR, there is little evidence that GDPR has played a role in reducing the number of data breaches.

    Organizations worked to optimize security in preparation for GDPR. However, security optimization has been a continuous effort for most organizations long before this regulation was introduced. Yet we continue to see studies indicating increases in the number of data breaches and volume of personal data exposed. There are several reports circulating with widely varying claims. What industry experts do agree on is that the number of cyber attacks continue to increase in volume and sophistication. So, it is not unreasonable to assert that we have not yet turned the tide on data breaches.

    The 2018 BDO Cyber Governance Survey shows that the number of cyber attacks increased significantly in 2018, including a 250 percent increase in business email compromise (spoofing) attacks and a 70 percent increase in spear-phishing attacks. Identity intelligence company, 4IQ, reported that 2018 saw a 424 percent increase in data breaches compared with 2017 with 14.9 billion identity records circulating in underground communities – a 71 percent increase over 2017. In the U.S., the Identity Theft Resource Center announced that the amount of exposed personally identify information increased 126 percent in 2018, even though data breaches, by their count, were down 23 percent. The organization makes a compelling case, that because companies are creating more and bigger repositories of personal data both on premises and in the cloud, the attackers’ jobs became easier.

    These statistics paint a clear picture. While GDPR gives consumers some power over how their data is used, it will take more work to reverse the trend on data breaches. The threat of huge fines is obviously compelling, but regulatory authorities in Europe have been flooded with over 59,000 breach reports, according to DLA Piper. How can one expect those agencies to comprehensively enforce GDPR security mandates? Yet, despite the practical limitations of GDPR, companies will continue to work toward a more mature state of GDPR compliance and continually improve their security posture. It’s the right thing to do, and it’s good for business. So, with that in mind, where should companies focus their efforts in year two?

    Last year, many companies scrambled to meet the deadline by focusing – understandably – on structured systems, such as CRMs. Much of their data inventory processes consisted of pen and paper exercises, and they used several disparate tools to accomplish different tasks. They made it through 2018, but they have a long way to go to extend compliance measures across their data universe.

    Priorities this year should include extending GDPR compliance operations to unstructured data, as well as minimizing reliance on niche tools to avoid creating data silos and expanding risk footprint. Adopting a comprehensive data protection and management solution will allow organizations to consolidate a number of key operations, such as data mapping, information risk remediation, lifecycle management, backup and recovery, as well as provisioning and orchestration for dev/test and analytics projects.

    In addition, this approach can create a centralized intelligence hub that provides a more efficient means of gaining visibility into and control over sensitive data “in the wild”, while enabling active management of all critical data sources. Such an approach can help organizations address the persistent challenges identified in the Cisco Data Privacy Benchmark Study. These challenges include accelerating discovery for data subject requests, improving data mapping, enforcing privacy-by-design processes, identifying employees who need further training, as well as optimizing data minimization and content-aware data management to facilitate better security planning and prioritization.

    While privacy legislation will not magically make personal data safer, GDPR has put personal privacy and corporate trust front and center. Debates will continue over establishing a global privacy treaty, the impacts on small and medium businesses, and using antitrust as a tool to augment legislative efforts. However, the collection and use of personal data is a pillar of the 21st century economy and companies need to reconcile their use of personal data to deliver value with consumers’ demands that their data be protected and not misused. If companies hope to maintain trust, they need to find practical ways to minimize risk, respond rapidly to data subject requests and optimize security and operational resilience. They must redouble their efforts in year two of the GDPR era while recognizing that privacy protection is not a destination, it’s a journey.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBeyond the Buzzwords: Machine Learning and AI in Cybersecurity
    Next Article Jamil Jaffer Chats about the Value of Sharing Threat Intelligence for Better Cybersecurity
    Erika Lee
    • Website

    Solutions Director, Commvault

    Related Posts

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    How Automation and eSignatures can Improve Employee Satisfaction

    IBM UK Survey: How Security and Compliance Impact Modernization

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 27, 2022

    Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Coffee and Politics
    PopSpective
    Coffee and Politics
    Adobe
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.